Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /27 /28 /29 /30 /27 /28 /29 /30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic? ARP.EXE NETSTAT.EXE Network Monitor Performance Monitor NBTSTAT ARP.EXE NETSTAT.EXE Network Monitor Performance Monitor NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transfer of data from a CPU to peripheral devices of a computer is achieved through modems interfaces computer ports None of these buffer memory modems interfaces computer ports None of these buffer memory ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Host-to-Host Internet Application Network Access Host-to-Host Internet Application Network Access ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets? 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.252 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these ANSWER DOWNLOAD EXAMIANS APP